Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reaching for Informed Revocation: Shutting Off the Tap on Personal Data., , , and . PrimeLife, volume 320 of IFIP Advances in Information and Communication Technology, page 246-258. Springer, (2009)Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements., , , and . PrimeLife, volume 352 of IFIP Advances in Information and Communication Technology, page 271-282. Springer, (2010)Can Cognitive Science Help Us Make Online Risk More Tangible?., and . IEEE Intelligent Systems, 24 (6): 32-36 (2009)Trustworthy and effective communication of cybersecurity risks: A review., , , and . STAST, page 60-68. IEEE, (2011)A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing., , and . Cyber Security, page 1-9. IEEE, (2019)Cyber Crossroads: A Global Research Collaborative on Cyber Risk Governance., , , , , , , , , and 4 other author(s). CoRR, (2021)The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes., , , , , and . CyberSA, page 1-8. IEEE, (2020)Applying Semantic Technologies to Fight Online Banking Fraud., , and . EISIC, page 61-68. IEEE Computer Society, (2015)Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat., , , , and . STAST, page 8-15. IEEE Computer Society, (2014)Communicating trustworthiness using radar graphs: A detailed look., , , , and . PST, page 333-339. IEEE Computer Society, (2013)